Oxford Computer Group enables your business to be efficient and competitive through innovative identity management, identity-driven security, and identity governance solutions.

For over a decade, we have been harnessing the power of digital identity to protect organizations’ data, realize cloud strategies, and maintain compliance.

Combining deep understanding of business processes and wide-ranging expertise of implementing enabling technologies from Microsoft and other partners, we can make your vision a reality.

Award-winning identity solutions

We are a Microsoft Solutions Partner for Security, and have won Microsoft’s Partner of the Year Award 8 times, and been finalists 9 times. We offer high quality, creative, and efficient IT solutions.
Discover our Award-Winning Solutions Imagine the possibilities!

Case study: Saying Goodbye to ADFS and Migrating to Microsoft Entra ID for a Zero Trust, Cloud-First Future

Read about how OCG helped a large federal agency migrate from ADFS to Microsoft Entra ID to improve security and streamline authentication processes.

Finding a resource like Oxford Computer Group is uncommon. They are credible and experienced in the identity space. Without OCG, we couldn’t have done what we’ve done so far.

Rich R, System Architect, Louisiana
More reviews
Microsoft Entra Suite overview, learn more about microsoft entra suite

Webinar Nov 14th

Discover the Microsoft Entra Suite: Unlocking Unified Identity and Access Management

Learn how the Microsoft Entra Suite streamlines identity and access management, enhances security, and ensures compliance.

See More

Latest articles & resources See all

Latest case studies & projects See all

Webinar recordings See all webinar recordings

IDENTITY INVERSION: PUTTING MICROSOFT ENTRA ID AT THE CENTER OF IDENTITY & AUTHENTICATION

Moving the center of identity and authentication away from on-premises directories and towards a Zero Trust security model.

VIEW WEBINAR

HOW DO VERIFIABLE CREDENTIALS AND DECENTRALIZED IDENTITIES WORK?

Learn what they are, how they work, and why they’re important.

VIEW WEBINAR

Read our most popular blogs

HOW DOES CONTINUOUS ACCESS EVALUATION FIT INTO YOUR ZERO TRUST STRATEGY?

In this post-perimeter security world, how end-users authenticate to and access corporate resources should be the top priority for CISOs and security teams.

Read more

TRANSITIONING AWAY FROM MIM IN A CLOUD-FIRST WORLD

This blog series examines the options and key considerations to help MIM users to determine their path to the cloud.

Read more

As well as identity consulting we offer...

TOP TRAINING

Our specialist training team, Oxford Computer Training, offers the world’s best Azure and MIM/FIM and PAM courses.

Read more

TOOLS FOR IDENTITY PROJECTS

Simplify processes, reduce development time, and save money on your identity project with our tools for MIM and FIM.

Read more

When we say we're good, we mean it!

Award winning identity solutionsConsistently Winning
Awarded Microsoft’s Partner of the Year 8 times

Identity Masterclass with John CraddockCustomer Feedback
Don’t just take our word for it, read what our customers think

Trusted Globally
We are THE go-to company for Microsoft identity solutions